Created
August 19, 2020 06:00
-
-
Save cdwijayarathna/36674780a980adacbb83aef02f5de394 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[INFO] 19/Aug/2020 11:11:28 - Performing Static Analysis of Android APK | |
[INFO] 19/Aug/2020 11:11:28 - Starting Analysis on : com.shinetext.shine.apk | |
[INFO] 19/Aug/2020 11:11:28 - Generating Hashes | |
[INFO] 19/Aug/2020 11:11:29 - Unzipping | |
[INFO] 19/Aug/2020 11:11:30 - Getting Hardcoded Certificates/Keystores | |
[INFO] 19/Aug/2020 11:11:30 - APK Extracted | |
[INFO] 19/Aug/2020 11:11:30 - Converting AXML to XML | |
[INFO] 19/Aug/2020 11:11:39 - Reading Android Manifest | |
[INFO] 19/Aug/2020 11:11:39 - Parsing AndroidManifest.xml | |
[INFO] 19/Aug/2020 11:11:39 - Fetching icon path | |
[INFO] 19/Aug/2020 11:11:40 - Extracting Manifest Data | |
[INFO] 19/Aug/2020 11:11:40 - Fetching Details from Play Store: com.shinetext.shine | |
[INFO] 19/Aug/2020 11:11:42 - Manifest Analysis Started | |
[INFO] 19/Aug/2020 11:11:42 - Static Android Binary Analysis Started | |
[INFO] 19/Aug/2020 11:11:42 - Static Android Resource Analysis Started | |
[INFO] 19/Aug/2020 11:11:42 - Reading Code Signing Certificate | |
[INFO] 19/Aug/2020 11:11:42 - Running APKiD 2.1.0 | |
[INFO] 19/Aug/2020 11:11:49 - Trackers Database is up-to-date | |
[INFO] 19/Aug/2020 11:11:49 - Detecting Trackers | |
[INFO] 19/Aug/2020 11:11:54 - APK -> JAVA | |
[INFO] 19/Aug/2020 11:11:54 - Decompiling to Java with jadx | |
[INFO] 19/Aug/2020 11:13:04 - DEX -> SMALI | |
[INFO] 19/Aug/2020 11:13:04 - Converting classes.dex to Smali Code | |
[INFO] 19/Aug/2020 11:13:04 - Converting classes2.dex to Smali Code | |
[INFO] 19/Aug/2020 11:13:04 - Converting classes3.dex to Smali Code | |
[INFO] 19/Aug/2020 11:13:04 - Static Android Code Analysis Started | |
[INFO] 19/Aug/2020 11:13:04 - Code Analysis Started on - java_source | |
[ERROR] 19/Aug/2020 11:14:34 - Performing Code Analysis | |
Traceback (most recent call last): | |
File "F:\jobs\Adelaide\mobsf\GIT\Mobile-Security-Framework-MobSF\StaticAnalyzer\views\android\code_analysis.py", line 67, in code_analysis | |
pfile.read_text('utf-8', 'ignore'), relative_java_path) | |
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python37\lib\pathlib.py", line 1178, in read_text | |
with self.open(mode='r', encoding=encoding, errors=errors) as f: | |
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python37\lib\pathlib.py", line 1165, in open | |
opener=self._opener) | |
File "C:\Users\ASUS\AppData\Local\Programs\Python\Python37\lib\pathlib.py", line 1019, in _opener | |
return self._accessor.open(self, flags, mode) | |
FileNotFoundError: [Errno 2] No such file or directory: 'F:\\jobs\\Adelaide\\mobsf\\GIT\\Mobile-Security-Framework-MobSF\\uploads\\695e3b42f67751757f03580166dc3376\\java_source\\kotlin\\coroutines\\experimental\\intrinsics\\IntrinsicsKt__IntrinsicsJvmKt$createCoroutineUnchecked$$inlined$buildContinuationByInvokeCall$IntrinsicsKt__IntrinsicsJvmK.java' | |
[INFO] 19/Aug/2020 11:14:34 - Extracting Strings from APK | |
[ERROR] 19/Aug/2020 11:14:35 - Error Performing Static Analysis | |
Traceback (most recent call last): | |
File "F:\jobs\Adelaide\mobsf\GIT\Mobile-Security-Framework-MobSF\StaticAnalyzer\views\android\static_analyzer.py", line 206, in static_analyzer | |
code_an_dic['urls_list'].extend( | |
TypeError: 'NoneType' object is not subscriptable | |
[ERROR] 19/Aug/2020 11:14:35 - 'NoneType' object is not subscriptable | |
[ERROR] 19/Aug/2020 11:14:35 - Internal Server Error: /StaticAnalyzer/ | |
ERROR:django.request:Internal Server Error: /StaticAnalyzer/ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment